Ediscovery Processing

We use a variety of analytical tools & methods to strip out irrelevant information & organize ESI for easier review & analysis

eDiscovery Processing Services

Improperly completing the eDiscovery processing stage can have severe consequences. For this reason, it is imperative that this process be left in the hands of professional and certified e-discovery consultants.

Every step of the e-discovery process is important, but the e-discovery processing stage is among the most critical. This step focuses on paring down the amount of ESI collected & rendering it more accessible & easily digestible.

We use a variety of analytical tools and methods to strip out irrelevant information and organize ESI for easier review and analysis.

Metadata Extractioning

Keyword Analysis

OCR Processing (Optical Character Recognition

Data Culling

DeNISTing

Data Deduplication

Irrelevant/Unresponsive file elimination

Our experts can assist you with any and all parts of the nine-stage EDRM process

Processing ESI reduces the amount of data for review, paring it down to the essential data relevant to the situation at hand

Improperly completing the e-discovery processing stage can have severe consequences. As a result of improper processing, there may be too much data to sift through, greatly increasing the time and expense required for the e-discovery process. Even worse, improperly-performed e-discovery processing can potentially lead to information that should have been reviewed being missed altogether, which can radically alter the outcome of the legal proceedings.

Metadata Extraction

E-discovery investigators search through metadata, data created to maintain and organize other data, to better organize collected ESI for review.

Keyword Analysis

E-discovery investigators sort and search through files and metadata for specific keywords pertaining to the investigation to better organize and review ESI collected in earlier stages of the e-discovery process.

OCR Processing

Some files, such as PDFs can look like text when you open them on the computer, but they actually have no text data stored in them. They are just an image, or a scan of a document and they are not keyword searchable. Our system will convert these documents to keyword searchable text.

Data Culling

Data culling is one of the key parts of e-discovery processing. This is what turns a mountain of ESI—most of it irrelevant—into a more easily-managed molehill. There are several methods for data culling, which our e-discovery consultants use in tandem to achieve the best results:

Data Culling Methods

DeNISTing

The National Institute of Standards and Technology (NIST) keeps records for every operating system outlining which files on a data storage device (such as your computer’s internal hard drive) belong to the operating system (as opposed to user-created files). These system files are usually completely irrelevant to an entity’s e-discovery needs and can be harmlessly stripped out, reducing clutter and confusion. DeNISTing is the process of using NIST’s own standards to identify these files and remove them from the ESI identified and collected during earlier stages in the e-discovery process.

Data Deduplication

In many cases, a source of ESI can contain duplicate files, database entries, or any other type of data which exists in multiple locations in a given source of ESI. Cutting out duplicate data from the review set can considerably reduce the amount of data to sift through and analyze, contributing to a more efficient e-discovery procedure.

Eliminating Unnecessary Files

Some files found while collecting data from a source of ESI are bound to be irrelevant to the scope of the investigation. Unnecessary files can be stripped from the review set based on a mutable set of criteria depending on the nature of the investigation and the questions that need to be answered over the course of the investigation. An e-discovery investigation may be concerned with only the data from a specific date range, for example, so any data falling outside of that range can be discarded. An e-discovery investigation may be concerned with files of a specific type, size, or file location as well.